Online games have taken the computer world by

Size: px
Start display at page:

Download "Online games have taken the computer world by"

Transcription

1 Editors: David Ahmad, Iván Arce, Online Games and Security GARY MCGRAW Cigital GREG HOGLUND HBGary Online games have taken the computer world by storm. Gaming has always been (and remains) a prime driver of PC technology, with deep penetration into the consumer market. In the past 10 years, it has grown as quickly as the Internet, and can now be found in tens of millions of homes. Along with the Internet s phenomenal growth comes plenty of adolescent growing pains, and as IEEE Security & Privacy readers know, these pains mostly concern problematic and pervasive computer security issues. Online games especially massively multiplayer online role-playing games (MMORPGs) suffer from such security problems directly; examples of MMORPGs include World of Warcraft, Second Life, Ever- Quest, EVE Online, Star Wars Galaxy, Lineage, and Ultima Online. In this short introduction to MMORPG security, we focus on bugs involving time and state. We can expect to see more of such bugs as real-world software evolves to become more like game software. Massively distributed systems From an attack trends perspective, online games are noteworthy due to their architectures and the resulting security issues. MMORPGs are made of very sophisticated software built around a massively distributed client-server architecture. (By massive, we mean more than 400,000 fat clients running complex game software connected simultaneously to banks of central servers. Because these games push the limits of software technology, especially when it comes to state and time (not to mention the real-time interaction of hundreds of thousands of users), they re particularly interesting as a case study in software security. In fact, MMORPGs are a harbinger of technical software security issues to come. Modern software of all kinds (not just game software) is evolving to be massively distributed, with servers interacting with thousands of users at once. The move to Web services and service-oriented architecture (SOA) built with technologies like Ajax and Ruby follows hard on the heels of online games. What we learn in the MMORPG security world today is bound to be widely applicable tomorrow in every other kind of software. Adding to the urgency of the security problem is the fact that online games are big business. The most popular MMORPG in the world, Blizzard Entertainment s World of Warcraft, has more than nine million users, each of whom pay US$14 a month for the privilege of playing. Inside MMORPGs virtual worlds, simple data structures have a value, mostly a reflection of the time gamers spend playing the game. Players also accumulate and trade virtual wealth, such as play money and pretend goods and services. Many virtual game economies have per capita GDPs greater than most small nations. 1 Not surprisingly, large numbers of direct connections exist between the virtual economies of games and the real economy. A well-developed middle market also exists, with the largest company, IGE ( earning more than US$400 million per year by acting as the real-world middle man for virtual goods. Virtual economies make excellent moneylaundering systems, as well. Sheer economics has led to the emergence of a class of players more interested in wringing virtual wealth out of the game than playing the game itself. Entire industries of sweatshops with hundreds of thousands of workers in China now exist to do just that. 1 Wherever money is at stake, criminals gather and linger. In the case of MMORPGs, cheaters have real economic incentive to break the games security and accumulate virtual items or gain experience points for their characters. Many of these items, and even the characters themselves, are then sold off to the highest bidder. Sophisticated hackers have worked the fertile fields of MMORPGs for years, some of them making a living directly from gaming (or cheating at gaming). Time and state bugs in games Bugs and flaws in software account for a majority of computer security risks. (Other work provides discussions about the difference between bugs found at the implementation level in software and flaws found 76 PUBLISHED BY THE IEEE COMPUTER SOCIETY /07/$ IEEE IEEE SECURITY & PRIVACY

2 Race conditions 101 Let s say that Alice and Bob work at the same company. Over , they decide to meet for lunch, agreeing to meet in the lobby at noon. However, they don t agree on whether they meant the lobby of their office or the building lobby several floors below. At 12:15, Alice is standing in the company lobby by the elevators, waiting for Bob. It then occurs to her that Bob might be waiting for her in the building lobby, on the first floor. Her strategy for finding Bob is to take the elevators down to the first floor to see if Bob is there. If Bob s there, all is well. If he isn t, can Alice conclude that Bob is late or has stood her up? No. Bob could have been sitting in the lobby, waiting for Alice. At some point, it could have occurred to him that Alice might be waiting upstairs, at which point he would have taken an elevator to check. If Alice and Bob were both on different elevators at the same time, they d pass each other during the ride. When Bob and Alice each assume that the other one is in the other place and both take the elevator, they ve been bitten by a race condition. A race condition occurs when an assumption needs to hold true for a period of time, but actually might not; whether it does or doesn t is a matter of exact timing. Every race condition has a window of vulnerability that is, a period of time during which violating the assumption will lead to incorrect behavior. In Alice and Bob s case, the window of vulnerability is approximately twice the length of an elevator ride. Alice can step on the elevator up until the point at which Bob s elevator is about to arrive and still miss him. Bob can step on the elevator up until the point that Alice s elevator is about to arrive. We could imagine the door to Alice s elevator opening just as Bob s door shuts. When the assumption is broken, leading to unexpected behavior, then the race condition has been exploited. at the architectural level. 2 ) This is true for banking applications, and it s also true for online games. So many security-related bugs exist in software, and they re so pervasive, that software tool vendors have created special tools just to look for them. Complicating the situation somewhat, scientists have published reams of papers on taxonomies for bugs, all of which disagree with each other. The most interesting and tricky security bugs involve time and state problems tangled in complex trust models. These problems arise because complex system state must be shared among many distributed processors with different levels of trustworthiness. This category of bugs is particularly relevant because it s also a harbinger of what to expect in the future as SOA catches on. Timing and synchronization problems are already a major issue in realworld software in fact, security practitioners have discussed them for more than a decade. But as massively distributed systems become more common and trust models get more complex, problems with synchronizing and tracking state will likewise become more common. Thanks to online games overall design, they re rife with time and state problems. Add to this the notion that servers shouldn t implicitly trust the game client itself, and you have a formula for disaster. In an online game like World of Warcraft, the biggest architectural challenge is sharing state information about the game with hundreds of thousands of client programs all at once. When so many thousands of client processes interweave on a common server, over the network, in real time, state confusion attacks pop up like mushrooms after a rain. In fact, race conditions (which we ll examine in more detail later) and other problems with state are the primary source of bugs in online games. They re exacerbated by laggy network connections (which tend to warp time in interesting ways sort of like black holes). By their very design, large online games require vast amounts of data storage distributed across many servers. Some servers store accounting information for billing, others store player statistics and inventory, and still others store the current state of an online world. However, the most serious problems crop up when state information is cracked off and shipped to untrusted game clients. Most game designers have chosen to ignore the insider threat of a game client gone bad. As a result, some state manipulation attacks can be as simple as directly hacking the parameters controlled by the game client software. (For more on insider threats like this see document.asp?doc_id=131477& WT.svl=column1_1.). Technically, most MMORPG s don t really involve single monolithic online worlds, but rather have many duplicate shards of what only seems to be a world. Copies of the online world that World of Warcraft uses, for example, tend to limit the number of users to 50,000 players per server. EVE Online ( is a single online world, but that virtual world is distributed across such a large universe (think solar systems) that no one server ever gets overloaded. The problem with multiple world shards is boundaries. Race conditions are found on the borders between software states such as the state of being logged in and the state of being logged out. If everything happens atomically that is, if you go from being logged in to being logged out in one fell swoop without gazillions of steps, things can go all right. But if multiple steps are involved, and they aren t protected by semaphores in critical sections, trouble can crop up. The sidebar Race conditions IEEE SECURITY & PRIVACY 77

3 101 gives a simple example of a race condition that can happen in the real world. Who knows, maybe this has even happened to you? Telehacking: A simple state manipulation attack Virtual worlds in online games seem real, but in fact, they re only as solid as the models on which they re built. Characters can travel through the game in many different ways: flying, swimming, teleporting, running, and walking are just some standard options. Many games even have magic spells to enhance all your travel needs. The state machine that manages travel is usually held in the client software, along with almost all of the 3D object interaction. By altering the client, you can alter how you travel. For this reason, many common game exploits modify the way the client program handles travel. One simple and elegant example of state manipulation involves finding and resetting the player character coordinates in an online game. As in many MMORPGs, your character s coordinates in World of Warcraft are part of the state information controlled by the game client. Instead of walking around the world (or moving normally), a cheating gamer can teleport by directly manipulating the location parameters in memory. If the character location coordinates set in this manner aren t very far from the current location, this kind of action can even appear to be normal movement. Telehacking uses the direct player character locationsetting method, but it usually refers to teleporting over vast regions of the game map, as opposed to small teleports to correct for position Bugs involving time and state are the kind we can expect to see more of as real-world software evolves to become more like game software. within a few virtual yards. (You can find the code for telehacking in World of Warcraft in our book Exploiting Online Games; www. exploitingonlinegames.com.) Overwriting a single byte in World of Warcraft s client code can enable a character to climb mountains or even climb straight up walls. Of course, gamers use this hack to get into places they re not supposed to get into. Using bugs to confuse state boundaries Telehacking in World of Warcraft is a very simple example of state manipulation, but time- and state-related problems can be much more complex. Plenty of software-related state boundaries are rife with timing problems. Ultimately, the biggest underlying issue is one of trust: if the client software is trusted to manipulate state properly and it is, by definition, under a potential attacker s control, security problems are the result. One of the most obvious softwarerelated boundaries involves databases. Transactions that involve multiple databases are often susceptible to race conditions. Because virtual worlds are distributed across many servers, doing things like switching from one virtual dungeon to another or flying from one virtual continent to another often causes a player to be handed off from one server to another. This kind of switch is a normal event in a game, and game company quality assurance (QA) has certainly tested it with a defined test plan not to mention that plenty of players have actually done the switch many times. But here s what happens in many QA shops. The test plan says something like, inventory is supposed to remain constant when a player does activity47 at portal68. Then a tester logs in, goes to portal68, performs activity47 and checks to see if everything is fine (such as, say, player inventory). This is what s known to software testers as a functional test. The problem is that this test is both boring and conventional! You see, attackers don t often do what they re supposed to do; instead, they focus on trying things that programmers never anticipated. They do the unexpected, sometimes with insane results. So here s an idea. Instead of gracefully walking through portal68, make sure you log out of the game while you re doing it. Pull the Ethernet cord out of the wall. Kill the game client with the task manager. When you re done, log back in and find out if anything juicy happened. Did you make it to the new continent or are you on the original side of portal68? What s the state of your character? Let s step through some possibilities, again thinking with our black hats on. Let s say you end up on the original side of the portal. What would happen if you gave some money to a player friend of yours just seconds before you killed the process, and that friend continued through the portal like normal? When you log back in this time, back on the original side of portal68, check your wallet. Was the money taken from your wallet, or did it reset itself along with your location? If it did reset (back to the original pre-give-some-away amount, does your friend also have some money on his side of the portal? If your money has doubled, you ve 78 IEEE SECURITY & PRIVACY SEPTEMBER/OCTOBER 2007

4 found a duping bug one of the most coveted bugs of all time in online gaming. Nothing like copying inventory for free! In World of Warcraft, several bugs like this exist around entrances to instance dungeons. That s because instances are just like continents or any other location in World of Warcraft they re handled on specific servers, and as players join an instance, they re in reality a glob of data being transferred from one back office server to another. In general, a single instance server is responsible for serving all particular instances of a given dungeon. For example, all deadmines instances run on the same deadmines server. However, because this is a very popular quest in the game, the server tends to become overloaded and laggy an ideal condition for trying to crowbar a race condition out of a game. As it turns out, botnets are very effective ways to induce lag on the net. Thus, botnets pose a serious security risk for online games. By using a botnet to cause a given game server to lag, an attacker can set things up for a more efficient race condition exploit. As an example of how state confusion attacks and broken trust models relate to future software systems, consider security issues surrounding Google s Desktop Search program. In February 2007, the software security firm Watchfire (since acquired by IBM) announced an attack methodology against Google Desktop that provides evidence of the trusted state problem in modern software architecture ( watchfire.com/whitepapers/over taking-google-desktop.pdf ). The attack that Watchfire describes works by misusing the trust model set up between Google s Web site and Google Desktop. Just as in online games, no malicious hacking or binary payload injection is required. The problem results from an architectural misunderstanding in what should trust what in the model. These are the kinds of security problems that result from modern software architectures when trust model boundaries are confused. As long as software designers don t explicitly consider the case of client software misbehavior in their designs, we re in for a whole lot of hurt, both in the virtual worlds of gaming and in the real world. Acknowledgments Some material in this article is used by permission from Exploiting Online Games (Addison-Wesley, 2007) and Building Secure Software (Addison-Wesley, 2001). References 1. G. Hoglund and G. McGraw, Exploiting Online Games, Addison- Wesley, 2007, pp G. McGraw, Software Security, Addison-Wesley, 2006, pp Gary McGraw is Cigital s chief technology officer. His real-world experience is grounded in years of consulting with major corporation and software producers. McGraw is the author of Exploiting Online Games (Addison-Wesley, 2007), Software Security: Building Security In (Addison-Wesley, 2006), Exploiting Software (Addison-Wesley, 2004), Building Secure Software (Addison-Wesley, 2001), and five other books. McGraw has a BA in philosophy from the University of Virginia and a dual PhD in computer science and cognitive science from Indiana University. He is a member of the IEEE Computer Society Board of Governors. Contact him at gem@cigital.com. Greg Hoglund is the founder of HBGary and runs rootkit.com. He is coauthor of Exploiting Online Games (Addison- Wesley, 2007), Rootkits: Subverting the Windows Kernel (Addison-Wesley, 2005) and Exploiting Software (Addison- Wesley, 2004). Interested in writing for this department? Please contact editors David Ahmad (drma@mac.com) and Iván Arce (ivan.arce@ coresecurity.com) Tried any new gadgets lately? Any products your peers should know about? Write a review for IEEE Pervasive Computing, and tell us why you were impressed. Our New Products department features reviews of the latest components, devices, tools, and other ubiquitous computing gadgets on the market. Send your reviews and recommendations to pvcproducts@ computer.org today! IEEE SECURITY & PRIVACY 79

5 $29 New Lower Subscription Price! Subscribe to our magazine today for only $29 our lowest price ever! You ll receive 6 issues of today s leading-edge, peer-reviewed software development information. Ask us how you can get this great deal on IEEE Security & Privacy magazine! S&P is the premier magazine for security professionals. Every issue is packed with tutorials, best practices, an expert commentary on: attack trends cybercrime security policies mobile and wireless issues digital rights management and much more. Visit us at

exploiting online games: an interview

exploiting online games: an interview G A R Y M C G R A W W I T H R I K F A R R O W exploiting online games: an interview Gary McGraw is the co-author of Exploiting Online Games and the author of Software Security. He is also the CTO of Cigital,

More information

Exploiting Online Games: Cheating massively distributed systems

Exploiting Online Games: Cheating massively distributed systems Exploiting Online Games: Cheating massively distributed systems Gary McGraw, Ph.D. CTO, Cigital http://www.cigital.com Cigital Founded in 1992 to provide software security and software quality professional

More information

Gaming Security. Aggelos Kiayias

Gaming Security. Aggelos Kiayias Gaming Security Aggelos Kiayias Online Gaming A multibillion $ industry. Computer games represent a 10 bn $ market. Single games have sold as many as 20 million copies. MMORPGs massively multiplayer online

More information

Online Gaming Is NOT Just for Kids Anymore

Online Gaming Is NOT Just for Kids Anymore IBM Electronics Podcast December, 2005 To hear this podcast, go to http://ibm.com/bcs/electronics/podcast. Andreas Neus is a consultant with IBM Germany and an expert in online gaming. Andreas is also

More information

The relationship between Gold Raid Team and World of Warcraft s Economy On Chinese. Servers. Han Li. WRIT 1133 class. University of Denver

The relationship between Gold Raid Team and World of Warcraft s Economy On Chinese. Servers. Han Li. WRIT 1133 class. University of Denver 1 The relationship between Gold Raid Team and World of Warcraft s Economy On Chinese Servers Han Li WRIT 1133 class University of Denver 1 2 Background Introduction NCTY was the operator of WoW in China,

More information

Game A. Auction Block

Game A. Auction Block Auction Block The purpose of the game is for each player to try to accumulate as much wealth as possible. Each player is given $10,000 at the start of the game. Players roll dice and move around a game

More information

Chapter 5: Game Analytics

Chapter 5: Game Analytics Lecture Notes for Managing and Mining Multiplayer Online Games Summer Semester 2017 Chapter 5: Game Analytics Lecture Notes 2012 Matthias Schubert http://www.dbs.ifi.lmu.de/cms/vo_managing_massive_multiplayer_online_games

More information

The language of Virtual Worlds

The language of Virtual Worlds The language of Virtual Worlds E-mails, chatgroups and the Web have all in common the fact of being electronic interactions about real things in the real world. In a virtual world interaction the subject-matter

More information

Coaching Questions From Coaching Skills Camp 2017

Coaching Questions From Coaching Skills Camp 2017 Coaching Questions From Coaching Skills Camp 2017 1) Assumptive Questions: These questions assume something a. Why are your listings selling so fast? b. What makes you a great recruiter? 2) Indirect Questions:

More information

Bellairs Games Workshop. Massively Multiplayer Games

Bellairs Games Workshop. Massively Multiplayer Games Bellairs Games Workshop Massively Multiplayer Games Jörg Kienzle McGill Games Workshop - Bellairs, 2005, Jörg Kienzle Slide 1 Outline Intro on Massively Multiplayer Games Historical Perspective Technical

More information

7 Bookkeeping Mistakes Chiropractors Make & How to Fix Them

7 Bookkeeping Mistakes Chiropractors Make & How to Fix Them 7 Bookkeeping Mistakes Chiropractors Make & How to Fix Them By: Kelly Perry, M.Ed., President of The Chiropractor s Bookkeeper Contents Introduction... 3 Mistake #1: Not Having A Written Budget That Is

More information

The Predictable Selling System

The Predictable Selling System The Predictable Selling System 6 Proven Steps For Getting More Customers Without Losing Money Most businesses fail. It s sad but true. According to Fortune Magazine... 9 out of 10 startups will fail. Bloomberg

More information

Scientists warn of space junk danger

Scientists warn of space junk danger www.breaking News English.com Ready-to-use ESL/EFL Lessons by Sean Banville 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html

More information

Getting The Click. A bonus guide From PotPieGirl

Getting The Click. A bonus guide From PotPieGirl Getting The Click A bonus guide From PotPieGirl When I was trying to come up with a somewhat clever name for this Bonus Guide, all I could think was what the guide is really about getting the click. It

More information

Paid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends

Paid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends Paid Surveys Secret The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report Published by Surveys & Friends http://www.surveysandfriends.com All Rights Reserved This

More information

The Red Bead Experiment. Some basic instructions on how to conduct the Red Bead Experiment or Red Bead Game.

The Red Bead Experiment. Some basic instructions on how to conduct the Red Bead Experiment or Red Bead Game. Some basic instructions on how to conduct the Red Bead Experiment or Red Bead Game. The Red Bead Experiment can be conducted with a Lightning Calculator Sampling Bowl or Sampling Box. While Dr. Deming

More information

Centralized Server Architecture

Centralized Server Architecture Centralized Server Architecture Synchronization Protocols Permissible Client/ Server Architecture Client sends command to the server. Server computes new states and updates clients with new states. Player

More information

Seaman Risk List. Seaman Risk Mitigation. Miles Von Schriltz. Risk # 2: We may not be able to get the game to recognize voice commands accurately.

Seaman Risk List. Seaman Risk Mitigation. Miles Von Schriltz. Risk # 2: We may not be able to get the game to recognize voice commands accurately. Seaman Risk List Risk # 1: Taking care of Seaman may not be as fun as we think. Risk # 2: We may not be able to get the game to recognize voice commands accurately. Risk # 3: We might not have enough time

More information

Assignment 3. The Internet as Social Technology

Assignment 3. The Internet as Social Technology Assignment 3 The Internet as Social Technology What can the Internet teach us about the relationship between society and technology? Discuss, illustrating your argument with examples drawn from either

More information

How to get more quality clients to your law firm

How to get more quality clients to your law firm How to get more quality clients to your law firm Colin Ritchie, Business Coach for Law Firms Tory Ishigaki: Hi and welcome to the InfoTrack Podcast, I m your host Tory Ishigaki and today I m sitting down

More information

Creating Agile Programs:

Creating Agile Programs: Creating Agile Programs Vendor Name: Rally Software Development Johanna Rothman, Owner Rothman Consulting Group, Inc. Johanna Rothman: Hi. I m Johanna Rothman, author of Manage It!: Your Guide to Modern,

More information

Persuasive. How to Write Persuasive. SEO Proposals

Persuasive. How to Write Persuasive. SEO Proposals Persuasive SEO Proposals How to Write Persuasive SEO Proposals How to Write Persuasive SEO Proposals! You may love SEO, but you didn t get into it because you love writing and submitting proposals. You

More information

Create Or Conquer Game Development Guide

Create Or Conquer Game Development Guide Create Or Conquer Game Development Guide Version 1.2.5 Thursday, January 18, 2007 Author: Rob rob@createorconquer.com Game Development Guide...1 Getting Started, Understand the World Building System...3

More information

Working On It, Not In It: The Four Secrets to Successful Entrepreneurship

Working On It, Not In It: The Four Secrets to Successful Entrepreneurship Working On It, Not In It: The Four Secrets to Successful Entrepreneurship 2 From the desk of Michael Gerber Founder, E-Myth Worldwide For over three decades, we have worked with thousands of small business

More information

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 By Dave And Aaron www.mymarketinggoldmine.com Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 Listen, We're Sick To Death of Seeing Money Hungry Border Line Criminals Who Want to Get Their Sticky

More information

How to Build a Business Like Hector La Marque s

How to Build a Business Like Hector La Marque s How to Build a Business Like Hector La Marque s 1. Always focus on personal recruiting and field-training: -Your personal example has a bigger impact than you imagine. -It s the best way to build personal

More information

My Earnings from PeoplePerHour:

My Earnings from PeoplePerHour: Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,

More information

World of Warcraft: Quest Types Generalized Over Level Groups

World of Warcraft: Quest Types Generalized Over Level Groups 1 World of Warcraft: Quest Types Generalized Over Level Groups Max Evans, Brittany Cariou, Abby Bashore Writ 1133: World of Rhetoric Abstract Examining the ratios of quest types in the game World of Warcraft

More information

Funcom. June Gaute Godager. OECD Working Party of the Information Economy Digital Broadband Content Panel Paris, 3rd June 2004

Funcom. June Gaute Godager. OECD Working Party of the Information Economy Digital Broadband Content Panel Paris, 3rd June 2004 Funcom OECD Working Party of the Information Economy Digital Broadband Content Panel Paris, 3rd June 2004 June 2004 Gaute Godager Agenda 1) Funcom highlights 2) Online market and business models 3) Online

More information

Handling the Pressure l Session 6

Handling the Pressure l Session 6 Handling the Pressure l Session 6 Under Pressure Role Plays Put Yourself into the Story Instructions: Photocopy this page and cut out the cards. Read one scenario at a time and choose a child to answer

More information

8 REAL ESTATE TECH & MARKETING TRENDS TO EMBRACE

8 REAL ESTATE TECH & MARKETING TRENDS TO EMBRACE 8 REAL ESTATE TECH & MARKETING TRENDS TO EMBRACE Are you overwhelmed by the latest marketing trends that promise more leads and sales? Are you ready to throw your computer against the wall trying to figure

More information

INTRODUCTION MARKET OVERVIEW

INTRODUCTION MARKET OVERVIEW CHINESE ONLINE GAMING 216 Essex Street, Salem, MA 01970 (978) 745-9233 (800) 888-MGMT www.ecabot.com info@ecabot.com Nearly 100 million people in China are playing online games. These users spent about

More information

Google SEO Optimization

Google SEO Optimization Google SEO Optimization Think about how you find information when you need it. Do you break out the yellow pages? Ask a friend? Wait for a news broadcast when you want to know the latest details of a breaking

More information

Design Tables, Configurations and DriveWorks

Design Tables, Configurations and DriveWorks Design Tables, Configurations and DriveWorks This question crops up a lot. When are Design Tables and Configurations the best way to achieve my Design Automation goals, and when would I benefit from the

More information

How to Make Money Selling On Amazon & Ebay! By Leon Tran

How to Make Money Selling On Amazon & Ebay! By Leon Tran How to Make Money Selling On Amazon & Ebay! By Leon Tran Chapter Content Introduction Page 3 Method #1: Amazon To Ebay Page 4 Method #2: Cross-Selling On Ebay Page 9 Method #3: Reselling The Big Bucks

More information

How to Write with Confidence. Dr Jillian Schedneck Writing Centre Coordinator

How to Write with Confidence. Dr Jillian Schedneck Writing Centre Coordinator How to Write with Confidence Dr Jillian Schedneck Writing Centre Coordinator Welcome to University! I m Jillian Schedneck, Coordinator of the Writing Centre. Writing is going to become a big part of your

More information

Global MMORPG Gaming Market: Size, Trends & Forecasts ( ) November 2017

Global MMORPG Gaming Market: Size, Trends & Forecasts ( ) November 2017 Global MMORPG Gaming Market: Size, Trends & Forecasts (2017-2021) November 2017 Global MMORPG Gaming Market: Coverage Executive Summary and Scope Introduction/Market Overview Global Market Analysis Dynamics

More information

ATIS Briefing March 21, 2017 Economic Critical Infrastructure and its Dependence on GPS.

ATIS Briefing March 21, 2017 Economic Critical Infrastructure and its Dependence on GPS. ATIS Briefing March 21, 2017 Economic Critical Infrastructure and its Dependence on GPS. Briefing question: If it s critical, then why isn t it uniformly monitored to detect bad actor jamming and spoofing

More information

Hello, and welcome to The Global Innovation. Outlook Podcast Series, where IBM demonstrates the

Hello, and welcome to The Global Innovation. Outlook Podcast Series, where IBM demonstrates the Transcript Title: Playing Games at Work Date: June 2007 Podcast Length: 9:06 Summary: Byron Reeves, a professor at Stanford University's Department of Communications, the faculty director of the Stanford

More information

Book Sourcing Case Study #1 Trash cash : The interview

Book Sourcing Case Study #1 Trash cash : The interview FBA Mastery Presents... Book Sourcing Case Study #1 Trash cash : The interview Early on in the life of FBAmastery(.com), I teased an upcoming interview with someone who makes $36,000 a year sourcing books

More information

19 Tough Questions to Ask About Your Freelance Business. (If you re not asking the tough questions, you re not achieving your full potential.

19 Tough Questions to Ask About Your Freelance Business. (If you re not asking the tough questions, you re not achieving your full potential. 19 Tough Questions to Ask About Your Freelance Business. (If you re not asking the tough questions, you re not achieving your full potential.) Nick Usborne 19 Tough Questions to Ask About Your Freelance

More information

Class 3 - Getting Quality Clients

Class 3 - Getting Quality Clients Class 3 - Getting Quality Clients Hi! Welcome to Class Number Three of Bookkeeper Business Launch! I want to thank you for being here. I want to thank you for your comments and your questions for the first

More information

Book Review: The dotcrime Manifesto: How to Stop Internet Crime

Book Review: The dotcrime Manifesto: How to Stop Internet Crime Publications 2008 Book Review: The dotcrime Manifesto: How to Stop Internet Crime Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication

More information

Chapter 23 The Bleeding Edge

Chapter 23 The Bleeding Edge Chapter 23 The Bleeding Edge Muhammad Barham June 11, 2014 Muhammad Barham Chapter 23 The Bleeding Edge June 11, 2014 1 / 18 Outline 1 Introduction 2 Computer Games 3 Web Applications 4 Privacy Technology

More information

COPYRIGHTED MATERIAL. Learning to Program. Part. In This Part

COPYRIGHTED MATERIAL. Learning to Program. Part. In This Part Part In This Part I Learning to Program Chapter 1: Programming for World of Warcraft Chapter 2: Exploring Lua Basics Chapter 3: Basic Functions and Control Structures Chapter 4: Working with Tables Chapter

More information

Volume 6, Number 3 Legal and Governance Challenges September 2013

Volume 6, Number 3 Legal and Governance Challenges September 2013 Volume 6, Number 3 Legal and Governance Challenges September 2013 Managing Editor Yesha Sivan, Metaverse Labs Ltd. Tel Aviv-Yaffo Academic College, Israel Guest Editors Melissa de Zwart, University of

More information

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Running head: THE IMPACT OF COMPUTER ENGINEERING 1 Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper

More information

Con Em If You Can was developed by the FINRA Investor Education Foundation in partnership with Commonwealth (formerly known as the D2D Fund).

Con Em If You Can was developed by the FINRA Investor Education Foundation in partnership with Commonwealth (formerly known as the D2D Fund). An Educator s Guide Brought to you by the FINRA Investor Education Foundation in partnership with Commonwealth Con Em If You Can is a Financial Entertainment video game that teaches players about the types

More information

How Minimalism Brought Me Freedom and Joy

How Minimalism Brought Me Freedom and Joy How Minimalism Brought Me Freedom and Joy I have one bag of clothes, one backpack with a computer, ipad, and phone. I have zero other possessions. Today I have no address. At this exact moment I am sitting

More information

AUGI Tips and Tricks: The Reunion Tour Autodesk Revit Style

AUGI Tips and Tricks: The Reunion Tour Autodesk Revit Style AUGI Tips and Tricks: The Reunion Tour Autodesk Revit Style Donnia Tabor-Hanson Cope Architecture AB3279 After many years of having a successful Autodesk University class on AUGI tips and tricks featuring

More information

High Net Worth Individuals

High Net Worth Individuals High Net Worth Individuals Transcripts Mobile Phones High Net Worth Individuals attitudes towards: Letter from the Client Services Director Vox Pops International is the first company in the UK to truly

More information

Game Design Methods. Lasse Seppänen Specialist, Games Applications Forum Nokia

Game Design Methods. Lasse Seppänen Specialist, Games Applications Forum Nokia Game Design Methods Lasse Seppänen Specialist, Games Applications Forum Nokia Contents Game Industry Overview Game Design Methods Designer s Documents Game Designer s Goals MAKE MONEY PROVIDE ENTERTAINMENT

More information

Huge Culver 2. Hugh: Thanks, Jaime. It s always fun.

Huge Culver 2. Hugh: Thanks, Jaime. It s always fun. Huge Culver 2 Jaime: Welcome to Eventual Millionaire Builders. I have Hugh Culver on the show. He s been on my show twice, I adore him. He helps experts grow their business bigger, better, faster. He s

More information

Elevator Music Jon Voisey

Elevator Music Jon Voisey Elevator Music 2003 Phil Angela Operator An elevator. CHARACTERS SETTING AT RISE is standing in the elevator. It stops and Phil gets on. Can you push 17 for me? Sure thing. Thanks. No problem. (The elevator

More information

How to Work with a Client s Resistance

How to Work with a Client s Resistance How to Work with a Client s Resistance Marsha Linehan, PhD and Peter Levine, PhD - Transcript - pg. 1 How to Work with a Client s Resistance How to Sell Behavior Change to Your Most Challenging Clients

More information

..\/...\.\../... \/... \ / / C Sc 335 Fall 2010 Final Project

..\/...\.\../... \/... \ / / C Sc 335 Fall 2010 Final Project ..\/.......\.\../...... \/........... _ _ \ / / C Sc 335 Fall 2010 Final Project Overview: A MUD, or Multi-User Dungeon/Dimension/Domain, is a multi-player text environment (The player types commands and

More information

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server Youngsik Kim * * Department of Game and Multimedia Engineering, Korea Polytechnic University, Republic

More information

And since you re that agent. This is that training. Let s get started.

And since you re that agent. This is that training. Let s get started. Welcome to the new and improved Monograms Booking Agent Program. Over the last year, we have taken time to create a program that is more interactive, more condensed, and is designed to bring you the information

More information

Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips

Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips G Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips Prioritize your leads for the most efficient use of time The phone scripts included

More information

Cato s Hike Quick Start

Cato s Hike Quick Start Cato s Hike Quick Start Version 1.1 Introduction Cato s Hike is a fun game to teach children and young adults the basics of programming and logic in an engaging game. You don t need any experience to play

More information

TDD Making sure everything works. Agile Transformation Summit May, 2015

TDD Making sure everything works. Agile Transformation Summit May, 2015 TDD Making sure everything works Agile Transformation Summit May, 2015 My name is Santiago L. Valdarrama (I don t play soccer. I m not related to the famous Colombian soccer player.) I m an Engineer Manager

More information

Overview. Sierra On-Line. Products. Sierra Overview. Divisions 2/21/2010

Overview. Sierra On-Line. Products. Sierra Overview. Divisions 2/21/2010 Overview Sierra On-Line Quick Sierra History Ken s Rules for Game Development Sierra Today Ken Williams March 15, 2001 Sierra Overview Founded in 1979 With Roberta Ran for 20 years Initial focus Apple

More information

A Quick Guide To Search Engine Optimization

A Quick Guide To Search Engine Optimization A Quick Guide To Search Engine Optimization For our latest special offers, free gifts and much more, Click here to visit us now You are granted full Master Distribution Rights to this ebook. You may give

More information

If...Then Unit Nonfiction Book Clubs. Bend 1: Individuals Bring Their Strengths as Nonfiction Readers to Clubs

If...Then Unit Nonfiction Book Clubs. Bend 1: Individuals Bring Their Strengths as Nonfiction Readers to Clubs If...Then Unit Nonfiction Book Clubs Bend 1: Individuals Bring Their Strengths as Nonfiction Readers to Clubs Session 1 Connection: Readers do you remember the last time we formed book clubs in first grade?

More information

Image Sequences or Vector Art in the Development of Flash* Games and Virtual Worlds? By Tom Costantini

Image Sequences or Vector Art in the Development of Flash* Games and Virtual Worlds? By Tom Costantini Image Sequences or Vector Art in the Development of Flash* Games and Virtual Worlds? By Tom Costantini For years, Adobe ActionScript* developers have been using Adobe Flash* as their main development tool

More information

Hanging Your Own Shingle? Put Your Best Foot Forward on Day One

Hanging Your Own Shingle? Put Your Best Foot Forward on Day One DALLAS HOUSTON Hanging Your Own Shingle? Put Your Best Foot Forward on Day One Hanging Your Own Shingle? Put Your Best Foot Forward on Day One By Scott Parks Androvett Legal Media & Marketing If you re

More information

wellgroundedlife Certification Program Healthy Boundaries 1. Healthy boundaries always begins with clarity within.

wellgroundedlife Certification Program Healthy Boundaries 1. Healthy boundaries always begins with clarity within. Healthy Boundaries Lesson Notes wellgroundedlife Certification Program 1. Healthy boundaries always begins with clarity within. 2. Healthy boundaries and managing expectations are deeply connected. Clarifying

More information

So to what extent do these games supply and nurture their social aspect and does game play suffer or benefit from it? Most MMORPGs fail because of a

So to what extent do these games supply and nurture their social aspect and does game play suffer or benefit from it? Most MMORPGs fail because of a The world of massively multiplayer online role play games used to be the realm of the unsocial geek and nerd. A sanctuary to escape the pains of modern life and be someone else. Because of the audience

More information

After the Fact Inventing the Future TRANSCRIPT. Originally aired May 24, Total runtime: 00:13:15

After the Fact Inventing the Future TRANSCRIPT. Originally aired May 24, Total runtime: 00:13:15 After the Fact Inventing the Future Originally aired May 24, 2017 Total runtime: 00:13:15 TRANSCRIPT Brian David Johnson, futurist-in-residence, Arizona State University: The future is built every day

More information

BASEBUILDERS. Makers of Smart Management Tools for. Architects and Engineers. Cash Flow Acceleration for Architecture and Engineering Firms

BASEBUILDERS. Makers of Smart Management Tools for. Architects and Engineers. Cash Flow Acceleration for Architecture and Engineering Firms BASEBUILDERS Makers of Smart Management Tools for Architects and Engineers Cash Flow Acceleration for Architecture and Engineering Firms Executive Overview Managing a successful firm is more complicated

More information

make over your CALENDAR A 7-DAY ONLINE COURSE CRYSTAL PAINE

make over your CALENDAR A 7-DAY ONLINE COURSE CRYSTAL PAINE make over your CALENDAR A 7-DAY ONLINE COURSE by CRYSTAL PAINE Copyright 2015 by Crystal Paine ALL RIGHTS RESERVED. No part of this publication may be reproduced, distributed, or transmitted in any form

More information

CEOCFO Magazine. Pat Patterson, CPT President and Founder. Agilis Consulting Group, LLC

CEOCFO Magazine. Pat Patterson, CPT President and Founder. Agilis Consulting Group, LLC CEOCFO Magazine ceocfointerviews.com All rights reserved! Issue: July 10, 2017 Human Factors Firm helping Medical Device and Pharmaceutical Companies Ensure Usability, Safety, Instructions and Training

More information

ANALYZING LIGHT USING CATCHLIGHTS

ANALYZING LIGHT USING CATCHLIGHTS Photzy ANALYZING LIGHT USING CATCHLIGHTS Short Guide Written by Karlo de Leon ANALYZING LIGHT USING CATCHLIGHTS! // PHOTZY.COM 1 Analyzing a photograph is a very good way to learn lighting. A photographer

More information

Writers: How to Write Faster, Better, and Make More Money While You Do

Writers: How to Write Faster, Better, and Make More Money While You Do Writers: How to Write Faster, Better, and Make More Money While You Do Dear Writer, If you rely on any amount of research to provide fact-based, credible, and believable content in what you write, this

More information

Addressing Exploit Abuse in EVE Online with Customer Care. Davíð Einarsson Senior Project Lead of Player Experience CCP Games

Addressing Exploit Abuse in EVE Online with Customer Care. Davíð Einarsson Senior Project Lead of Player Experience CCP Games Addressing Exploit Abuse in EVE Online with Customer Care Davíð Einarsson Senior Project Lead of Player Experience CCP Games What is EVE Online? Core Mechanics Player-driven economy Skill training Single

More information

Design Document for: Name of Game. One Liner, i.e. The Ultimate Racing Game. Something funny here! All work Copyright 1999 by Your Company Name

Design Document for: Name of Game. One Liner, i.e. The Ultimate Racing Game. Something funny here! All work Copyright 1999 by Your Company Name Design Document for: Name of Game One Liner, i.e. The Ultimate Racing Game Something funny here! All work Copyright 1999 by Your Company Name Written by Chris Taylor Version # 1.00 Thursday, September

More information

Small Business Guide to Google My Business

Small Business Guide to Google My Business Small Business Guide to Google My Business What is Google My Business? Simply put, Google My Business is how Google puts your business on their Search Results Pages, Google Maps and Google+ for free. By

More information

4 Don ts of Medical Practice Marketing

4 Don ts of Medical Practice Marketing Transcript Details This is a transcript of an educational program accessible on the ReachMD network. Details about the program and additional media formats for the program are accessible by visiting: https://reachmd.com/programs/optimize-business-finances-outreach/4-donts-medical-practicemarketing/10022/

More information

Your Law firm marketing

Your Law firm marketing Ten Opportunities to improve Your Law firm marketing Practical strategies you can use to grow your law practice. Your marketing strategy is the key to growing your law firm. If your marketing strategy

More information

EVERYONE IS SOMEONE LYRICS

EVERYONE IS SOMEONE LYRICS 1)The Whole World s Watching I got this, bring it I ll dance it, I ll sing it I ll chance it, it s my choice Got my feet, got my voice Ignite the fire inside me Got my own light to guide me EVERYONE IS

More information

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003 Efficient UMTS Lodewijk T. Smit and Gerard J.M. Smit CADTES, email:smitl@cs.utwente.nl May 9, 2003 This article gives a helicopter view of some of the techniques used in UMTS on the physical and link layer.

More information

A better world through BETter WORLDs

A better world through BETter WORLDs A better world through BETter WORLDs mmorpgs and practical hacker ethics 21 st September 2005 waag society professor Richard A. Bartle University of essex, england introduction FormalLy, I was invited

More information

Week 1. Seating Arrangement: Supplies: Colored Markers Large Index Cards Small Index Cards Copies of Course Syllabus Chart Paper

Week 1. Seating Arrangement: Supplies: Colored Markers Large Index Cards Small Index Cards Copies of Course Syllabus Chart Paper Week 1 Seating Arrangement: Supplies: Colored Markers Large Index Cards Small Index Cards Copies of Course Syllabus Chart Paper Class Introductions: Large Index Cards: Ask students to fold the card in

More information

Comparison: On-Device and Drive Test Measurements

Comparison: On-Device and Drive Test Measurements OpenSignal Commercial in Confidence Comparison: On-Device and Drive Test Measurements Methodology Background opensignal.com 0 The only thing that really matters when it comes to network performance is

More information

ULTIMATE LEAD MAGNET WORKBOOK

ULTIMATE LEAD MAGNET WORKBOOK ULTIMATE LEAD MAGNET WORKBOOK WHAT S IN IT FOR YOU Lead magnets are what you use to attract and capture your ideal client. They re basically a targeted bit of content used to bribe an ideal client to hand

More information

< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network

< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network < AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network Atsushi FUJITA Hiroshi ITSUKI Hitoshi MATSUBARA Future University Hakodate, JAPAN fujita@fun.ac.jp Focusing

More information

CMSC 425: Lecture 23 Detecting and Preventing Cheating in Multiplayer Games

CMSC 425: Lecture 23 Detecting and Preventing Cheating in Multiplayer Games CMSC 425: Lecture 23 Detecting and Preventing Cheating in Multiplayer Games Reading: This lecture is based on the following articles: M. Pritchard, How to Hurt the Hackers: The Scoop on Internet Cheating

More information

Heuristics: Rules of Thumb

Heuristics: Rules of Thumb MODELING BASICS Heuristics: Rules of Thumb Tony Starfield recorded: November, 2009 What is a heuristic? A heuristic is a rule of thumb. It is something that is sometimes true and sometimes works, but sometimes

More information

Finally! A Step-by-Step, No Fuss Method To Creating Cash-Generating Content 20X Faster With Less Effort!

Finally! A Step-by-Step, No Fuss Method To Creating Cash-Generating Content 20X Faster With Less Effort! Finally! A Step-by-Step, No Fuss Method To Creating Cash-Generating Content 20X Faster With Less Effort! Once You Apply These Content Hacks You ll Be Able TO TURN that content into MULTIPLE INCOME STREAMS!...

More information

(Children s e-safety advice) Keeping Yourself Safe Online

(Children s e-safety advice) Keeping Yourself Safe Online (Children s e-safety advice) Keeping Yourself Safe Online Lots of people say that you should keep safe online, but what does being safe online actually mean? What can you do to keep yourself safe online?

More information

:::1::: Copyright Zach Browman - All Rights Reserved Worldwide

:::1::: Copyright Zach Browman - All Rights Reserved Worldwide :::1::: WARNING: This PDF is for your personal use only. You may NOT Give Away, Share Or Resell This Intellectual Property In Any Way All Rights Reserved Copyright 2012 Zach Browman. All rights are reserved.

More information

I once was flat broke, with no job, no skills and no education. I was going nowhere in life - fast.

I once was flat broke, with no job, no skills and no education. I was going nowhere in life - fast. Edwin Dollars edwindollars.com Hi I m Edwin, nice to meet you! I make six figures a year with my network of finance blogs. But before you think I m special or something, let me stop you right there. I

More information

Seven steps to success

Seven steps to success 2 CHAPTER Seven steps to success You want your clients to succeed, and we, of course, want you to succeed. The good news is you already have an engaged client. The fact that they were willing to commit

More information

CS1800: More Counting. Professor Kevin Gold

CS1800: More Counting. Professor Kevin Gold CS1800: More Counting Professor Kevin Gold Today Dealing with illegal values Avoiding overcounting Balls-in-bins, or, allocating resources Review problems Dealing with Illegal Values Password systems often

More information

20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF

20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF WITH CYNTHIA PASQUELLA-GARCIA 20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF (EVEN IF YOU DON T LIKE YOURSELF) W ORKSHEET {MISS EPISODE 002 WITH KAILA PRINS, ACCEPTANCE: WHY WE CAN DO BETTER

More information

Computer Consultant Questionnaire

Computer Consultant Questionnaire Please respond to these questions to assist me in deciding if you will be our next computer consultant. Thank you, Mary Jones Small Biz, Inc. Response from Rescue Marketing Q1: How is your company different

More information

2005 First Quarter Presentation

2005 First Quarter Presentation 2005 First Quarter Presentation Safe Harbor This presentation contains statements of a forward-looking nature. These statements are made under the safe harbor provisions of the U.S. Private Securities

More information

Skills 360 Handling Technical Interviews (Part 1)

Skills 360 Handling Technical Interviews (Part 1) Skills 360 Handling Technical Interviews (Part 1) Discussion Questions 1. How do you feel when you have to prepare for a difficult interview? 2. When you don t understand an interview question, what do

More information

Social Media that Work in

Social Media that Work in Prospecting Social Media that Work in ANY Situation I think it s safe to assume that if you re involved in network marketing today, you re using social media (most likely Facebook) to try and find prospects

More information

MMORPG REVIEW! ONLINE MAGAZINE VOLUME: 1 ISSUE: 2 DECEMBER 2005 TABLE OF CONTENTS TABLE OF CONTENTS...2. Trickster love at first site...

MMORPG REVIEW! ONLINE MAGAZINE VOLUME: 1 ISSUE: 2 DECEMBER 2005 TABLE OF CONTENTS TABLE OF CONTENTS...2. Trickster love at first site... MMORPG REVIEW! ONLINE MAGAZINE VOLUME: 1 ISSUE: 2 DECEMBER 2005 TABLE OF CONTENTS TABLE OF CONTENTS...2 Trickster love at first site...3 Runescape Why do people play?...4 Maple Story Cartoony to the MAX...4

More information